libgcrypt20-1.6.1-48.1<>,q5\;/=„|i؃h7ja=+KK<>bTe/K LK!BwX]+ M^*\,e#K@oLilŲ=CGLNK?iy-lzd[ȳR+m?xבG.gK4N^/SdDb`InzfO9j0Q9CI'PL83\1)'߰AlAFt8RPz" ZQ;!)k\mm$Ζ>?K?Kd  0  HNXh p x   <L(8I9I: &I>G@GFH GH HH0IH@XHDYHT\Hl]H|^HbIcIdJ6eJ;fJ@lJBuJTvJdwKxKyK( zK\KlK}KClibgcrypt201.6.148.1The GNU Crypto LibraryLibgcrypt is a general purpose crypto library based on the code used in GnuPG (alpha version).\;cloud136openSUSE Leap 42.3openSUSEGPL-2.0-or-later AND LGPL-2.1-or-laterhttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://directory.fsf.org/wiki/Libgcryptlinuxx86_64[HgA큤\8\9\:QCu1c5d140bcf2c7ec9d0931433bcf0fbecbbb461211a33b134d42ed5ee802b37fflibgcrypt.so.20.0.1rootrootrootrootrootrootrootrootlibgcrypt-1.6.1-48.1.src.rpmlibgcrypt.so.20()(64bit)libgcrypt.so.20(GCRYPT_1.6)(64bit)libgcrypt20libgcrypt20(x86-64)@@@@@@@@@@@   /sbin/ldconfig/sbin/ldconfiglibc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.15)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libgpg-error.so.0()(64bit)libgpg-error.so.0(GPG_ERROR_1.0)(64bit)rpmlib(CompressedFileNames)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsLzma)3.0.4-14.0-14.4.6-14.11.2[@[*AZ@Z@ZYx@Yg`Y[@YV=@Y:Y1S@W:W;WW@V@VV@U@U@Ug@U_@U_@U_@U]U>$UT@T~TTfT|T@T->@T*@T)IT%U@T%U@T%U@T$T!`TT&@T&@T_S0SS,Sr @ShShR>R@RƦ@RƦ@RRQdQ@Q@QQo@QLGQGQ O/@O7NN@N@NR@LfL0wK,@I@@Pedro Monreal Gonzalez psimons@suse.compmonrealgonzalez@suse.compmonrealgonzalez@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.compmonrealgonzalez@suse.comvcizek@suse.compmonrealgonzalez@suse.compjanouch@suse.depjanouch@suse.depjanouch@suse.dehpj@suse.comhpj@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comabergmann@suse.comabergmann@suse.comabergmann@suse.comvcizek@suse.comvcizek@suse.comjmatejek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comlnussel@suse.devcizek@suse.comlnussel@suse.devcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.commeissner@suse.commeissner@suse.comvcizek@suse.comvcizek@suse.comvcizek@suse.comidonmez@suse.comandreas.stieger@gmx.dedmueller@suse.commvyskocil@suse.commvyskocil@suse.commvyskocil@suse.comandreas.stieger@gmx.demvyskocil@suse.comcoolo@suse.comcrrodriguez@opensuse.organdreas.stieger@gmx.demvyskocil@suse.comandreas.stieger@gmx.decoolo@suse.comchris@computersalat.decrrodriguez@opensuse.orgopensuse@dstoecker.dejengelh@medozas.decoolo@suse.comcrrodriguez@opensuse.orgmvyskocil@suse.czjengelh@medozas.dejengelh@medozas.decrrodriguez@suse.de- Fail selftests when checksum file is missing in FIPS mode only (bsc#1117355) * add libgcrypt-binary_integrity_in_non-FIPS.patch- Apply "CVE-2018-0495.patch" from upstream to enable blinding for ECDSA signing. This change mitigates a novel side-channel attack. [CVE-2018-0495, bsc#1097410]- Suggest libgcrypt20-hmac for package libgcrypt20 to ensure they are installed in the right order. [bsc#1090766]- Extended the fipsdrv dsa-sign and dsa-verify commands with the - -algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455). * Added libgcrypt-fipsdrv-enable-algo-for-dsa-sign.patch * Added libgcrypt-fipsdrv-enable-algo-for-dsa-verify.patch- Fix a regression in the fix for bsc#1043333 which caused libgcrypt to leak file descriptors (bsc#1059723) * add libgcrypt-fips_avoid_clash_with_gkd.patch * drop libgcrypt-fips_no_static_fd_random.patch- libgcrypt stored an open file descriptor to the random device in a static variable between invocations. gnome-keyring-daemon on initialization reopens descriptors 0-2 with /dev/null which caused an infinite loop when libgcrypt attempted to read from the random device (bsc#1043333) add libgcrypt-fips_no_static_fd_random.patch- Avoid seeding the DRBG during FIPS power-up selftests (bsc#1046659) * don't call gcry_drbg_instantiate() in healthcheck sanity test to save entropy * turn off blinding for RSA decryption in selftests_rsa to avoid allocation of a random integer * add libgcrypt-fips_dont_seed_drbg_in_selftests.patch - fix a bug in gcry_drbg_healthcheck_sanity() which caused skipping some of the tests * libgcrypt-fips_drbg_healthcheck_sanity_bug.patch (bsc#1046659#c4)- dlsym returns PLT address on s390x, dlopen libgcrypt20.so before calling dlsym (bsc#1047008) * add libgcrypt-fips-use_dlopen_to_get_hmac_path.patch- Security fix [CVE-2017-7526, bsc#1046607] * libgcrypt-CVE-2017-7526-1.6.1-2.patch - Hardening against local side-channel attack * libgcrypt-CVE-2017-7526-1.6.1-1.patch - Factored code for function (secret) and added new functions (secret_core_std, secret_core_crt) in cipher/rsa.c- Don't require secure memory for the fips selftests (bsc#931932) * prevents "Oops, secure memory pool already initialized" warning - modified libgcrypt-fips_run_selftest_at_constructor.patch- Added libgcrypt-secure-EdDSA-session-key.patch [bsc#1042326] * Store the session key in secure memory to ensure that constant time point operations are used in the MPI library.- Add libgcrypt-CVE-2016-6313-1.patch and libgcrypt-CVE-2016-6313-2.patch (bsc#994157 CVE-2016-6313)- make the -hmac package depend on the same version of the library, fixing bsc#979629 FIPS: system fails to reboot after installing fips pattern- Add libgcrypt-CVE-2015-7511.patch (bsc#965902), fixing side-channel attack on ECDH with Weierstrass curves- Update libgcrypt-bsc932232-avoid-drbg-crash-with-fips.patch (bsc#970882). Fixes crashes with GPG key generation.- Add libgcrypt-bsc932232-avoid-drbg-crash-with-fips.patch (bsc#932232).- fix for CVE-2015-0837 (bsc#920057) * Fixed data-dependent timing variations in modular exponentiation [related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks are Practical] * added patches: libgcrypt-CVE-2015-0837-1.patch libgcrypt-CVE-2015-0837-2.patch libgcrypt-CVE-2015-0837-3.patch- don't drop privileges when locking secure memory (bsc#938343) * added libgcrypt-secmem_dont_drop_privilege.patch- the RSA decryption needs p < q for CRT to work (bnc#929919) * added libgcrypt-fips_rsa_p_less_than_q.patch - minor changes to the testsuite * modified libgcrypt-fips_testsuite.patch- remove obsolete drbg_test.patch added Aug 22 2014, now covered by libgcrypt-fips_add_drbg_cavs_test.patch * removed drbg_test.patch- update local cavs_driver.pl copy to the latest version- enable DRBG reseeding * added libgcrypt-1.6.1-drbg-reseeding.patch * added drbg_test-reseeding.patch- add possibility to specify salt length for RSASSA-PSS verification * added libgcrypt-fips_pss.patch- perform selftests if the module is complete (checksum files are installed) (bnc#928740) * changed libgcrypt-fips_run_selftest_at_constructor.patch- updated %post and %postun scripts with correct .info filenames- fix CVE-2014-3591 (bnc#920057) * use ciphertext blinding for Elgamal decryption * added libgcrypt-CVE-2014-3591.patch- handle priming error in DRBG continuous test (bnc#905483) * added libgcrypt-fips_handle_priming_error_in_drbg.patch from Jan Matejek- fix a bug in FIPS 186-4 dsa generation * changed libgcrypt-fips-dsa.patch - testsuite adjustments to make it work in fips mode (bnc#899524) * added libgcrypt-fips_testsuite.patch * dropped FIXME-temporary-hack-to-make-some-tests-work.patch- use the RSA keygen generator from Fedora that supports KAT tests * added libgcrypt-fips_rsa_keygen.patch - add gcrypt_rsagtest binary for CAVS testing of rsa keygen KAT * added libgcrypt-fips_KAT_keygen_test.patch- merge in RSA keygen RPP and KAT tests from Fedora * fixes bnc#900275 and bnc#900276 * added libgcrypt-fips_cavs_rsa_keygen.patch- all the drbg patches were merged into v10-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch - update drbg_test (libgcrypt-fips_add_drbg_cavs_test.patch) - add libgcrypt-fips_fipsdrv.patch- address a potential integer issue * changed libgcrypt-fips_PKBKDF_missing_step1.patch- enable HW support in fips mode (bnc#896435) * added libgcrypt-fips_enable_hardware_support.patch- fixes from Jan Matejek: * make DSA selftest use 2048 bit keys (bnc#898003) * added ECDSA selftests and add support for it to the CAVS testing framework (bnc#896202) * fix a bug in fipsdrv * changed patches: - libgcrypt-1.6.1-fips-cavs.patch - libgcrypt-fips_ecdsa.patch - libgcrypt-fips-dsa.patch- hide most of the fips patches behind a conditional, so they are not applied- fix condition for minimal e_value (bnc#896201, RSA-FIPS-186-4-adjustments.patch) - more testsuite fixes (fix-test-suite-for-RSA-in-fips-mode.patch, FIXME-temporary-hack-to-make-some-tests-work.patch)- don't apply libgcrypt-fips_run_selftest_at_constructor.patch * the system currently doesn't boot with it in FIPS mode (bnc#898253)- update libgcrypt-1.6.1-use-fipscheck.patch to not require hardcoding library soname - FIPS 186-4 RSA adjustments (bnc#896201) Added patches: * calculate-fips-checksum-after-build.patch * disable-algorithms-that-are-not-allowed-in-fips.patch * RSA-FIPS-186-4-adjustments.patch * skip-GCM-for-FIPS.patch * fix-test-suite-for-RSA-in-fips-mode.patch * FIXME-temporary-hack-to-make-some-tests-work.patch- add missing PKSC5v2.1 step 1 to PBKDF algorithm (bnc#898005)- disabled curve P-192 in FIPS mode (bnc#896202) * added libgcrypt-fips_ecdsa.patch - don't use SHA-1 for ECDSA in FIPS mode - also run the fips self tests only in FIPS mode- run the fips self tests at the constructor code * added libgcrypt-fips_run_selftest_at_constructor.patch- rewrite the DSA-2 code to be FIPS 186-4 compliant (bnc#894216) * added libgcrypt-fips-dsa.patch * install fips186_dsa - use 2048 bit keys in selftests_dsa- fix an issue in DRBG patchset * size_t type is 32-bit on 32-bit systems - added v9-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch - added v9-0007-User-interface-to-DRBG.patch - removed v7-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch - removed v7-0007-User-interface-to-DRBG.patch - update drbg_test.c to the latest release- fix a potential NULL pointer deference in DRBG patchset * fixes from https://bugs.g10code.com/gnupg/issue1701 * added v7-0001-SP800-90A-Deterministic-Random-Bit-Generator.patch * added v7-0007-User-interface-to-DRBG.patch * removed 0001-SP800-90A-Deterministic-Random-Bit-Generator.patch.bz2 * removed 0007-User-interface-to-DRBG.patch - add a subpackage for CAVS testing * add cavs_driver.pl and cavs-test.sh from the kernel cavs package * added drbg_test.patch- split off the -hmac package that contains the checksums- libgcrypt-fix-rng.patch: make drbg work again in FIPS mode. - libgcrypt-1.6.1-use-fipscheck.patch: library to test is libgcrypt.so.20 and not libgcrypt.so.11 - libgcrypt-init-at-elf-load-fips.patch: initialize at ELF DSO load time.- add new 0007-User-interface-to-DRBG.patch from upstream * fixes bnc#877233- add support for SP800-90A DRBG (fate#316929, bnc#856312) * patches by Stephan Mueller (http://www.chronox.de/drbg.html): 0001-SP800-90A-Deterministic-Random-Bit-Generator.patch.bz2 0002-Compile-DRBG.patch 0003-Function-definitions-of-interfaces-for-random.c.patch 0004-Invoke-DRBG-from-common-libgcrypt-RNG-code.patch 0005-Function-definitions-for-gcry_control-callbacks.patch 0006-DRBG-specific-gcry_control-requests.patch 0007-User-interface-to-DRBG.patch- FIPS changes (from Fedora): - replaced libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff by libgcrypt-1.6.1-fips-cfgrandom.patch - libgcrypt-fixed-sizet.patch: fixed an int type for -flto - libgcrypt-1.6.1-use-fipscheck.patch: use the fipscheck binary - libgcrypt-1.6.1-fips-cavs.patch: add CAVS tests- Drop arm-missing-files.diff, fixed upstream- libgcrypt 1.6.1, a bugfix release with the folloging fixes: * Added emulation for broken Whirlpool code prior to 1.6.0. * Improved performance of KDF functions. * Improved ECDSA compliance. * Fixed message digest lookup by OID (regression in 1.6.0). * Fixed memory leaks in ECC code. * Fixed some asm build problems and feature detection bugs. * Interface changes relative to the 1.6.0 release: GCRY_MD_FLAG_BUGEMU1 NEW (minor API change).- add arm-missing-files.diff: Add missing files to fix build- fix bnc#856915: can't open /dev/urandom * correct libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff - require libgpg-error 1.11 or higher- fix dependency for 32bit devel package - name hmac files according soname - fix hmac subpackage dependency- update to 1.6. * Removed the long deprecated gcry_ac interface. Thus Libgcrypt is not anymore ABI compatible to previous versions if they used the ac interface. Check NEWS in libgcrypt-devel for removed interfaces. * Removed the module register subsystem. * The deprecated message digest debug macros have been removed. Use gcry_md_debug instead. * Removed deprecated control codes. * Improved performance of most cipher algorithms as well as for the SHA family of hash functions. * Added support for the IDEA cipher algorithm. * Added support for the Salsa20 and reduced Salsa20/12 stream ciphers. * Added limited support for the GOST 28147-89 cipher algorithm. * Added support for the GOST R 34.11-94 and R 34.11-2012 (Stribog) hash algorithms. * Added a random number generator to directly use the system's RNG. Also added an interface to prefer the use of a specified RNG. * Added support for the SCRYPT algorithm. * Mitigated the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See [CVE-2013-4242]. * Added support for Deterministic DSA as per RFC-6969. * Added support for curve Ed25519. * Added a scatter gather hash convenience function. * Added several MPI amd SEXP helper functions. * Added support for negative numbers to gcry_mpi_print, gcry_mpi_aprint and gcry_mpi_scan. * The algorithm ids GCRY_PK_ECDSA and GCRY_PK_ECDH are now deprecated. Use GCRY_PK_ECC if you need an algorithm id. * Changed gcry_pk_genkey for "ecc" to only include the curve name and not the parameters. The flag "param" may be used to revert this. * Added a feature to globally disable selected hardware features. * Added debug helper functions. - rebased patches * libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff * libgcrypt-ppc64.patch - add libgcrypt-1.6.0-use-intenal-functions.patch to fix fips.c build - Move all documentation to -devel package- update to 1.5.3 [bnc#831359] CVE-2013-4242 * Mitigate the Yarom/Falkner flush+reload side-channel attack on RSA secret keys. See .- port SLE enhancenments to Factory (bnc#831028) * add libgcrypt-unresolved-dladdr.patch (bnc#701267) * add libgcrypt-1.5.0-etc_gcrypt_rngseed-symlink.diff (bnc#724841) * add libgcrypt-1.5.0-LIBGCRYPT_FORCE_FIPS_MODE-env.diff - install .hmac256.hmac (bnc#704068) - enable varuous new options in configure (m-guard, hmac binary check and random device linux) - build with all ciphers, pubkeys and digest by default as whitelist simply allowed them all- avoid gpg-offline in bootstrap packages- Library must be built with large file support in 32 bit archs.- update to 1.5.2 * The upstream sources now contain the IDEA algorithm, dropping: idea.c.gz libgcrypt-1.5.0-idea.patch libgcrypt-1.5.0-idea_codecleanup.patch * Made the Padlock code work again (regression since 1.5.0). * Fixed alignment problems for Serpent. * Fixed two bugs in ECC computations.- add GPL3.0+ to License tag because of dumpsexp (bnc#810759)- update to 1.5.1 * Allow empty passphrase with PBKDF2. * Do not abort on an invalid algorithm number in gcry_cipher_get_algo_keylen and gcry_cipher_get_algo_blklen. * Fixed some Valgrind warnings. * Fixed a problem with select and high fd numbers. * Improved the build system * Various minor bug fixes. * Interface changes relative to the 1.5.0 release: GCRYCTL_SET_ENFORCED_FIPS_FLAG NEW. GCRYPT_VERSION_NUMBER NEW. - add verification of source code signatures - now requires automake 1.11 to build- update license to new format- fix deps * libgpg-error-devel >= 1.8 - add libsoname macro- Libraries back into %{_libdir}, /usr merge project- add the missing IDEA algorithm after the patent is no longer relevant- Remove redundant/unwanted tags/section (cf. specfile guidelines)- add libtool as explicit buildrequire to avoid implicit dependency from prjconf- Update to version 1.5.0, most important changes * Uses the Intel AES-NI instructions if available * Support ECDH.- update to 1.4.6 * Fixed minor memory leak in DSA key generation. * No more switching to FIPS mode if /proc/version is not readable. * Fixed a sigill during Padlock detection on old CPUs. * Boosted SHA-512 performance by 30% on ia32 boxes and gcc 4.3; SHA-256 went up by 25%. * New variants of the TIGER algorithm. * New cipher algorithm mode for AES-WRAP. * Interface changes relative to the 1.4.2 release: GCRY_MD_TIGER1 NEW GCRY_MD_TIGER2 NEW GCRY_CIPHER_MODE_AESWRAP NEW- add missing definition of udiv_qrnnd for sparcv9:32 - use %_smp_mflags- add baselibs.conf as a source - disable the use of hand-coded assembler functions on sparc - this is giving me an infinite loop with ./tests/prime (specifically ./sparc32v8/mpih-mul1.S:_gcry_mpih_mul_1. Fedora disables this too.- update to version 1.4.4 * Publish GCRY_MODULE_ID_USER and GCRY_MODULE_ID_USER_LAST constants. This functionality has been in Libgcrypt since 1.3.0. * MD5 may now be used in non-enforced fips mode. * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes. * In fips mode, RSA keys are now generated using the X9.31 algorithm and DSA keys using the FIPS 186-2 algorithm. * The transient-key flag is now also supported for DSA key generation. DSA domain parameters may be given as well./sbin/ldconfig/sbin/ldconfigcloud136 15454121551.6.1-48.11.6.1-48.1libgcrypt.so.20libgcrypt.so.20.0.1libgcrypt20COPYING.LIB/usr/lib64//usr/share/doc/packages//usr/share/doc/packages/libgcrypt20/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:9381/openSUSE_Leap_42.3_Update/56a3541f08ebd5cee17c177f20656398-libgcrypt.openSUSE_Leap_42.3_Updatedrpmlzma5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4c4ddf9c2feea9506d44e593689447f7f5d636c8, strippeddirectoryASCII text PPR R RRRRRRR R RkI J îglibgcrypt20-hmac1.6.1-48.1?]"k%f0]dJtZQuѶ5mq ;EҧMvW6J=x &@<3A]dy@; ɀՠ~xd ľh`PrISEMGuc\B4eO`-mqyO,k Y= ˮe 5'} \N =eJf[KGtRMT"Kg9X_DK:Heq-s v8l ֖-s~/"R2mW,9a$:QAꚜX)@zz.e1!m RHPD"[u*w꒨GEû>V@ ?"k8ٵZ QyUHkJi[u;fvTy l2=6"]qofqq!:,vi}^PqF眥Eqrc%n 9u# ~4-/%UL.R7H*<]vBiG1*J:t{y=9DY5ѷ4swy~+< x7jXݯTbKm8rT"KBi &><j{rA.w`j;> {=z_p1 UV gILX"T ruPJ|I?#td{:6BFVF#>)cɬx@ 9y|jַׂ(ųe{H/Mtn A0H5qDe֘C m9Ih)AbRS뉻*C590Wf1f=$GlB#Ոؐ%C`>%Ѕ}%)(iqΒOF:!v>vpg]+b@IZI/z gLz3=NKLgN,"4T=Q 79[TW#YcC<7a>sUR:ʨ.L"Yo1n׏=h|>Qd)\m|>onT :Z C,LMlj[=6c A3w͚*븍FBP[6d!]v~&Oh l, ^)(O=ްw^؁Õ9k7!?>/kG]F1uC*n < ~ma &Z\b/ kSۓ}(nlQ xS9@}|-mVcQ䷫Tc)D՟r- $XyHxn0Б4D(s,'&}NlNPK =%u٦3&(tJntQ0Ċ@b]-ZCkAI, YCav[n$sgPU?1 ׆U69"HP,NuYy Xzynx8<|ŝ%& 7nE on8+ۍZBe#&AAaL9Xd?L#Y?Y tnt;PKHK`n״M(,^z8XS'mR&Ӵ9%&oVP]/Pw&NSbj+bJ!б]jMnRr)؍u"Dj>m?Q4ot !S6m^ahxm=ST .̦8i6oW* K Xv9pj-gvcLdOUCPJo"} ƅ}lKɹ,ܞm5:)ы5ץCy4sNR%=FT]1 :[W%MXR08+ͺܜQ/ ~ZK8g x}C』E sHwyހCيEO,Pw84J Cu=4eǐX H zc`42E۾lGĹoSG>M/o -}#`h iQQ~nv!iT \ȳ Ah{gP{3ՁE)Ɗ8|ӑda!%|/|9v-kCN7i| i g2O;,v+ zYd\<|*ulN6Vо2m}N$yCN سNG=kNL:c5: Ա.Ka*XH4^gTG鉅E'%\è+Xҟ9CuR~€ܾeıMK,/D1I=~BE*5Jڊ0tANge}f-]nyMI29~Q U)$e%Hϓ5>>C<"3S  y}%#`bP(F ]pȥm(=G;>#epTemmJZ},BaTcq nE>EGGn:"4b5jOf,Ң2f[U\HϜ KtcewT]mVR5<&]ցq}o5BuGyYj{9>I K[e(^ulm* zLp+ h7,T{FW^Htle{)JC:;oI,e bÒom wa_?-^eK]Xmrgf/C[€([;uAߪESʭim*Ny#r~(1y * ɌـͼyD׾bet=tkYǠk(HU?XIWՋ|y| w $ wqx*` rfƎd0A!ldٚZ$-Z4r Oiy[]q#\4Xg[L=p+yrXe|݀)wԸ* sȽ_/? vYN1盘" U<[icN$z+T 5Yﶸ;z[6(nR>jqļWj5q5~Lsh, {EЩ6 nź[,iRIU%5~?4w3IDn)j\Hxki/42G_k"7:#9Uc/+\V9}EIVFZ}ϊ-`wӃ0 G_iԇUVI7sE6Efq")UC;ēe}p61j MdED4j]VC>qB9P>)W C\6N I>&} =um{$W?D 2}M6|NKA(HYB[K+s̤$l"<[z S t{Vy*9C~&Y罜#n~y(Vt^v55 ƶ%D2)\b٣C6ړ'_pxZ:g؝U;auK[z$ʼUs*îQ9ʊqȁ[c:}<ʭ\,qMJ[q$%] a t;;g@섂ڔ!*۸ rG`$NW^ȫE 0/[IĶ'ml%W>Qu[_Ჶ.%}VIgcPۯ Eyأ "zP/ABc E10*vCSJ"2&:#a3'ߏ[y|CptL_˅ rSukkɂ~ϻP@'pw\F%KύIz4{r/ ~߂F±3_u7d-4^5ӱkIT4DJgQ]W|?D `/;vcc݊HEZ|>0&Q{%# *o *Š7 (n4I0w`#uϽ@|sxb3l W*,q[sr.{uwT-Zs H؀!4/wԞ^Qhw>OHC?K܈ӒY{ȅ0=fBTr1ΰyK%J _IG]%k:GfrnM-TI1i{PS-kUW U:9sDbFXݷ@ CE]JHeBggՓ8pb)\ί)1'L\,@P<] _aZ1x/A~;S0Q !Z0~4pKV k?q')+K7M1ƍ;?ԃJ+]á)V,m\ӛ rjd^.>ű,:Hu*8Мݳ.x@*آjT(0U ruN;0`nNm@`fN0ŠяY<{S0HTl]?.֕ j'ԣoɜ09Ф{O_SqO#Vb,!.V$v:u*&L,]Z2J*`5 < n217(@_#k9Vrr5,HD8l'9Ӟfhb!0C݃d3o@{r{/=$H}twK񅝪Q<ūdy*Xzl)P:Ey~!rf G1sC&,njgTu^"4?BCB(`Ne}q`3.%  /0z3G3r5zZ,Z|o_uF]_mU ٨*̵x@hwPlJu^c c;Re=?(ߔtQ 8N&@*k,fp9Xo<^CoM5Y^;ʉDu6\Eo~_!%_wbhs:d ܗ0Qy6ޣLRpǫA͈]ȅ-0fW|o5He:+[ꬷWe|EYa[VAr;*⒭| EG2 Iiuژ]Pہfc=* zEQ "q.R&BQ>Z!8vf'%~]tG_i@Wd ?vg9\E\,}.VFHJ+4R9NoT<P#|K17m$a`g$HH`;sLq{҆/]awZI8#' aYMIq9%7h'H |E+! Pp$[ZQ'\o+6eoV5QzBWK%o]Gtsw؜@cMvqm>0>9a<&2S\"%8xB_ YJB T3m\|qf2cBu3?w_⛏xtR`%nx5l.wtMu?oH `#Ss}?He5)#R i:iB8&'I\BRjrBpbD߷PϚ2;S'V;X/\E M~ᜍ44o ;}I=J{-3xA)Vf)c0Y@O_oO LF  ڜ9.^Z;>9YҀx3+ֺ,DzYgRF?߅. ܮ  ĞQ1a𲫓\}O{N[L2d^5DZ_e tUnM/9dOC _ϓO'[ 4wYfaO}6)ޜLȫ?{;YT{Xa%/8؊y$eHb9|eyi:5Dž&!NŦM!'53wS >U>}cqM [M,WqtdBy`7)zm OO"N>